Skocz do zawartości

Aktywacja nowych użytkowników
Zakazane produkcje

  • advertisement_alt
  • advertisement_alt
  • advertisement_alt
Courses2024

Third Party Risk Management (TPRM) Complete Course

Rekomendowane odpowiedzi

9171dd2181390977352384d985ef8f1c.jpeg
Free Download Third Party Risk Management (TPRM) Complete Course
Published 10/2024
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 441.87 MB | Duration: 3h 24m
Vendor Risk Management | TPRM Lifecycle | GRC | IT Audit

What you'll learn
Third Party Risk Management
Third Party Risk Management Lifecycle
Planning and preparation
Selection and Due Diligence
Contract Negotiation and Onboarding
Incident Management and Response
Termination and Offboarding
Continuous Monitoring
Requirements
Laptop, Desktop required to view and parti[beeep]te in lessons
Enthusiastic about learning about learning how to perform a Risk Assessment
Description
In today's interconnected world, third-party relationships are essential for business success. However, these relationships can also expose organizations to significant risks-cyber threats, data breaches, regulatory non-compliance, financial loss, operational disruptions and reputational damage.Introducing the comprehensive "Third Party Risk Management" course!Gain the expertise needed to effectively manage and mitigate the risks associated with third-party vendors and partners.What Will You Learn?Understanding Third Party Risk: Define and assess the different types of third-party risks, from financial to cybersecurity.The TPRM Lifecycle: Learn about the complete lifecycle of third-party risk management, including due diligence, contracting, performance tracking, risk monitoring, and offboarding.Vendor Due Diligence: Understand how to effectively perform due diligence when onboarding new third-party vendors.Incident Management & Response: Gain skills in developing incident response plans for third-party breaches and understand how to recover quickly.Regulatory Compliance: Master the key regulatory requirements related to third-party risks, including GDPR, CCPA, SOC 2, PCI DSS, and Sarbanes Oxley (SOX).TPRM Governance: Understand governance frameworks that align with the organization's risk appetite and tolerance.Risk Assessment Techniques: Learn how to evaluate third-party risks using industry-leading frameworks like NIST, ISO 27001, COSO ERM, and Shared Assessments SIG.Who Should Enroll:Students, IT Professionals, Starting or Changing career into ITAnyone interested in pursuing a career in Third Party Risk ManagementIT professionalsRisk AnalystIT Security AnalystIT Compliance AnalystCyber Security ProfessionalsIT AuditorsIT Control TestersInformation Security ProfessionalsDon't Miss Out - Enroll Today! Invest in your future and take your career to new heights with the Third-Party Risk Management Complete Course. Join thousands of satisfied students who have transformed their careers with our industry-leading training.
Overview
Section 1: Introduction
Lecture 1 Introduction
Lecture 2 Understanding Third Party Risk Management (TPRM)
Lecture 3 Types of Third Party Relationships
Lecture 4 Benefits of Third Party Relationships
Lecture 5 Challenges With Managing Third Party Relationships
Lecture 6 Third Party Risks
Lecture 7 Inherent Risks
Lecture 8 Residual Risks
Lecture 9 Udemy Review System
Lecture 10 Resources and Recommendations
Lecture 11 Types of Third Party Risks
Section 2: Third Party Risk Management Program
Lecture 12 TPRM Program
Lecture 13 Governance & Third Party Risk Management
Lecture 14 TPRM Risk Management Framework (RMF)
Lecture 15 NIST Cybersecurity Framework (CSF) 2.0
Lecture 16 NIST Special Publication 800-53
Lecture 17 ISO27001 Framework
Lecture 18 COSO Framework
Lecture 19 SIG Questionnaire
Lecture 20 Risk Appetite
Lecture 21 TPRM Teams - Roles & Responsibilities I
Lecture 22 TPRM Teams - Roles & Reponsibilities II
Lecture 23 Regulatory Compliance
Section 3: Planning & Scoping
Lecture 24 Third Party Risk Management Lifecycle
Lecture 25 Planning & Scoping
Lecture 26 Identifying Potential Vendors
Lecture 27 Request for Proposal (RFP)
Lecture 28 Request for Information (RFI)
Section 4: Selection & Due Diligence - Part 1
Lecture 29 Selection & Due Diligence
Lecture 30 Criticality & Inherent Risk
Lecture 31 Due Diligence Activities
Lecture 32 Third Party Profile
Lecture 33 Inherent Risk Questionnaire
Lecture 34 Risk Assessment & Due Diligence
Lecture 35 Risk Assessment
Section 5: Selection & Due Diligence - Part 2
Lecture 36 Information Security Risk Assessment
Lecture 37 Operational Risk Assessment
Lecture 38 Human Resources Risk Assessment
Lecture 39 Privacy & Data Protection Risk Assessment
Lecture 40 Compliance Risk Assessment
Lecture 41 Financial Risk Assessment
Lecture 42 Vendor Risk Management Framework
Lecture 43 Fourth Party Assessment
Lecture 44 Risk Identification
Lecture 45 Risk Treatment / Response
Lecture 46 Risk Assessment Report
Lecture 47 Service Organization Controls (SOC)
Lecture 48 SOC Categories and Types
Lecture 49 Understanding SOC Reports
Lecture 50 Reviewing SOC Reports
Section 6: Contract Management
Lecture 51 Contract Management
Lecture 52 Key Stakeholders in Contract Management
Lecture 53 Negotiating Contract Terms
Lecture 54 Contract Review and Approvals
Lecture 55 Ongoing Contract Management
Lecture 56 Key Components of Service Level Agreements (SLAs)
Lecture 57 Key Steps When an SLA is Breach
Section 7: Monitoring & Performance Management
Lecture 58 Monitoring and Performance Tracking 1
Lecture 59 Monitoring and Performance Tracking 2
Lecture 60 Incidence Response Management 1
Lecture 61 Incidence Response Management 2
Section 8: Termination & Offboarding
Lecture 62 Types of Contract Termination
Lecture 63 Termination and Offboarding Process - Part 1
Lecture 64 Termination and Offboarding Process - Part 2
Lecture 65 Best Practices for Effective Termination and Offboarding
Section 9: Continuous Improvement
Lecture 66 Continuous Improvement Activities
Lecture 67 Congratulations
Students, Professionals, Starting or Changing career into IT,Risk Analyst, Cyber Security Analyst, Information Security Analyst, IT Auditor, IT professionals
Screenshot
Homepage

Ukryta Zawartość

    Treść widoczna tylko dla użytkowników forum DarkSiders. Zaloguj się lub załóż darmowe konto na forum aby uzyskać dostęp bez limitów.





Ukryta Zawartość

    Treść widoczna tylko dla użytkowników forum DarkSiders. Zaloguj się lub załóż darmowe konto na forum aby uzyskać dostęp bez limitów.

No Password - Links are Interchangeable

Udostępnij tę odpowiedź


Odnośnik do odpowiedzi
Udostępnij na innych stronach

Dołącz do dyskusji

Możesz dodać zawartość już teraz a zarejestrować się później. Jeśli posiadasz już konto, zaloguj się aby dodać zawartość za jego pomocą.

Gość
Dodaj odpowiedź do tematu...

×   Wklejono zawartość z formatowaniem.   Usuń formatowanie

  Dozwolonych jest tylko 75 emoji.

×   Odnośnik został automatycznie osadzony.   Przywróć wyświetlanie jako odnośnik

×   Przywrócono poprzednią zawartość.   Wyczyść edytor

×   Nie możesz bezpośrednio wkleić grafiki. Dodaj lub załącz grafiki z adresu URL.

    • 1 Posts
    • 5 Views
    • 1 Posts
    • 5 Views
    • 1 Posts
    • 5 Views
    • 1 Posts
    • 7 Views

×
×
  • Dodaj nową pozycję...

Powiadomienie o plikach cookie

Korzystając z tej witryny, wyrażasz zgodę na nasze Warunki użytkowania.